Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-1623

Опубликовано: 08 фев. 2013
Источник: nvd
CVSS2: 4.3
EPSS Низкий

Описание

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:yassl:cyassl:*:*:*:*:*:*:*:*
Версия до 2.4.6 (включая)
cpe:2.3:a:yassl:cyassl:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:yassl:cyassl:2.4.0:*:*:*:*:*:*:*

EPSS

Процентиль: 76%
0.00935
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
почти 13 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

redhat
около 13 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

debian
почти 13 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not ...

github
больше 3 лет назад

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

EPSS

Процентиль: 76%
0.00935
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-310